SSProtect is the collection of components and services provided by the :Foundation Client and KODiAC Cloud Services that work together in the protection and management of host application data while also providing advanced incident response capabilities that minimize security threats.

Host application data includes information distributed throughout your document files - Microsoft Word, Excel, PowerPoint - Office documents, for example, not to mention Acrobat .PDF documents, Outlook email messages, and other specialized applications. This so-called, "unstructured data", most often resides on a host computer, or endpoint, that you use everyday - your laptop or desktop computer.

These files contain information ranging from unimportant to highly valuable. Attackers have become adept at stealing this information and selling it on the black market, or holding it for Ransom, putting everyone at increasing risk.

Every SSProtect component is specially crafted to protect this information. Follow this link to see our progression from Day 1 to the release of :Respond.​

SSProtect is a collection of software components/ services that:

Protect sensitive application data from unauthorized disclosure

Provide insightinto when, where, and how protected content is used

Insure data remains highly available, even when sabotaged

We deliver SSProtect insuring that the system:

Works with existingsoftware and infrastructure

Has minimal impact on end-users, retaining native workflows

Limits impact to IT with simple deployment and Administration

The KODiAC Architecture was specially designed to utilize the cloud as an enabling participant for data protection rather than an inherent risk. Our approach enables us to provide certainties not available with existing data protection software, providing immediate and direct insight into attack patterns, data leak sources, weaknesses in coverage, and areas of opportunity targeted and compromised by a wide variety of changing threats.

Requirement

Encrypt data but retain native file formats

Access data using normal application workflows

Provide two-factor authentication credentials by touching a USB key

Share like you do today, using almost any existing mechanism

Recover versions of protected content with a few mouse clicks

Generate access reports to see what's at risk and what remains secure

Set traps to detect the presence of unwanted intruders

Know who sees your data, and who does not - never allow another system's ineffectiveness to be the source of your data's disclosure

Value

No tricks, no special folders - protected files act just like normal files

Not just another encryption solution, not another set of empty promises, no more exaggeration. Our primary goal is straightforward:Provide highly effective host data protection that doesn't make you change the way you work.